Gajendra Singh

Learn More
—The proposed system highlights a novel approach for creating a secure steganographic method and visual cryptography for data hiding in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted image. The proposed method(More)
Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user of the cloud may want to verify the trusted status(More)
Spectrum scarceness is one of the major challenges that the present world is facing. The efficient use of existing licensed spectrum is becoming most critical as growing demand of the radio spectrum. Different researches show that the use of licensed are not utilized inefficiently. It has been also shown that primary user does not use more than 70% of the(More)
In this paper we proposed a novel algorithm for auto uploading the data in the cloud environment without any license consideration and suggest a novel framework where data is auto upload after a proper authentication and processing their task (gathering and sharing) in the cloud environment. Here we present the authentication process with auto uploading(More)
The relationship between topological indices and antitubercular activity of 5â-O-[(N-Acyl)sulfamoyl]adenosines has been investigated. A data set consisting of 31 analogues of 5â-O-[(N-Acyl)sulfamoyl]adenosines was selected for the present study. The values of numerous topostructural and topochemical indices for each of 31 differently substituted analogues(More)
— The paper addresses some theoretical and practical aspects of data mining, focusing on predictive data mining, where two central types of prediction problems are discussed: classification and regression. Further accent is made on predictive data mining, where the time-stamped data greatly increase the dimensions and complexity of problem solving. The main(More)
In this paper, we propose an improved block cipher symmetric encryption algorithm that has the same structure of encryption and decryption. So far, conventional cryptography algorithms have difference structure of encryption and decryption. We devise our algorithm by inserting a symmetric layer using random number, encryption number and XOR operations, in(More)
In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data.(More)
The present study illustrates the photosensitizing behavior of mefloquine (MQ) in human skin keratinocytes under ambient doses of UVB and sunlight exposure. Photochemically, MQ generated reactive oxygen species superoxide radical, hydroxyl radical, and singlet oxygen through type I and type II photodynamic reactions, respectively, which caused(More)